Category Category

License License

Translations Translations

Programming Language Programming Language

  • More...

Status Status

Audience Audience

User Interface User Interface

Database Environment Database Environment

Top Apps

  • Multi-vendor storage monitoring simplified Multi-vendor storage monitoring simplified Icon
    Multi-vendor storage monitoring simplified Icon

    Monitor your multi-vendor storage to help ensure your applications get the performance & capacity they need with SolarWinds® Storage Resource Monitor.

    SolarWinds Storage Resource Monitor (SRM) gives you multi-vendor storage performance monitoring and alerting to help ensure peak storage performance. Automated capacity planning helps you predict storage shortages, reclaim space, and prevent application outages. SRM integrates with other Orion® Platform products to provide end-to-end visibility into the application stack, and lets you easily troubleshoot performance issues from application to storage.
  • Trial SolarWinds Backup and you could receive a free Amazon Echo Dot Trial SolarWinds Backup and you could receive a free Amazon Echo Dot Icon
    SolarWinds Backup provides lightning-quick recovery that can restore business continuity after a disaster. For a limited time only, when you try SolarWinds Backup and store at least 100GB of selected data, you have the chance to receive a free Amazon Echo Dot.
  • ChatFox

    Sohbet ederken ozel ifadeler, goz kirpmalari, şarki sozleri gonderebilme, goz yormayan grafikler, size ozel sinirsiz messenger kişi listesi, TV, Radio, Flash oyunlar, gunluk fal gibi eğlence ihtiyaclarinin tumunu karşilayabilen bir program.

    Downloads: 4 This Week Last Update: See Project
  • USE secure operating system Icon

    USE secure operating system

    a secure, open source OS for use inside USEagency facilities

    A secure and open source operating system. All communications that reasonably can be will be encrypted. It will also have fined-tuned firewall capabilities, with a default policy of deny all inbound except HTTP HTTPS and SSH. Web browser will be sand boxed from other parts of the OS. In order to access saved passwords, cache, cookies, ect in web browser, username/password are required. Downloaded files (and any other files entering the system) will be subjected to both an exception-based and signature-based virus scan. After that, they will be placed in a leveled security storage space, each more secure--with the most secure being 50. Under 50 will be 46-49; under that is 36-45; under that is 27-25; under that is 26; under that is 14-25; under that is 6-13; under that is 5-3; lastly there is level 2 the most insecure. The operating system itself will require many passwords: boot up, access logon screen, login, admin, and more/ Mainly, it will be built with strong security as its base

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you